diff --git a/_information/Collections.md b/_information/Collections.md
index b140e83..eff3e06 100644
--- a/_information/Collections.md
+++ b/_information/Collections.md
@@ -5,7 +5,9 @@ title: Collections
permalink: /collections
---
-## Information Pages
+
+
Various pages on miscellaneous information and topics.
+
@@ -15,6 +17,13 @@ A collection of links, articles, resources and more.
+---
+
## [Qubes OS](./qubes)
-A collection of QubesOS related content.
\ No newline at end of file
+A collection of QubesOS related content.
+
+
+
+
+[dvm-zulucrypt](./qubes/dvm-zulucrypt) - Notes on how to setup a disposable zulucrypt instance for USB devices.
\ No newline at end of file
diff --git a/_information/Qubes/dvm-zulucrypt.md b/_information/Qubes/dvm-zulucrypt.md
new file mode 100644
index 0000000..3b83bba
--- /dev/null
+++ b/_information/Qubes/dvm-zulucrypt.md
@@ -0,0 +1,34 @@
+---
+layout: default1
+description: Notes reguarding DVM zulucrypt
+title: dvm-zulucrypt
+permalink: /qubes/dvm-zulucrypt
+---
+
+Notes on how to setup a disposable zulucrypt instance for USB devices.
+
+
+
+### Prerequesites:
+
+Setup a minimal `kicksecure` template based on [this guide](./#debian-security).
+
+Install the `zulucrypt` package:
+
+``sudo apt install zulucrypt``
+
+
+
+### Setup
+
+- Create an `AppVM` titled `template-dvm-crypt` with the template created above.
+
+- Net Qube: `(none)`
+
+- In `Advanced`, select `Disposable Template`
+
+- In `Applications` select `zuluCrypt`
+
+
+
+After this, create a new `DisposableVM` titled `dvm-crypt` with the template as `template-dvm-crypt` and networking as `(none)`.
\ No newline at end of file